​​​​​​​​​​​​​​​​​​​​​​Software as a Service (SaaS)

The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure.11 The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email) or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited userspecific application configuration settings.

Safe Haven

A repository in which data are stored and accessed in ways that maintain their integrity and quality whilst meeting relevant ethical and legal controls on their use and dissemination.

Science DMZ +

A Science DMZ  (Data Management Zone​) is a framework, model, and best practice to set up a high-performing, scalable and secure portion of a network to facilitate data-intensive science applications and does not include support for general-purpose networking (such as web surfing, email, etc.)—this traffic belongs behind the enterprise firewall and on the general-purpose network.  By separating the high-performance science network from the general-purpose network, each network can respectively be optimized without interfering with the other.
Lees meer

Secondary Uses

Use of data or biospecimens in a way that differs from the original purpose for which they were generated or collected. 


Secure Shell (SSH)

A network protocol for operating non-web based IT services securely over the internet. SSH uses public-keys to authenticate the remote computer and if necessary the user. SSH verifies whether the user offering the public key associated with the user’s identity also owns the matching private key.​


Security Assertion Markup Language (SAML)

An XML-based protocol for exchanging authentication and authorization data between identity providers and service providers in order to access web-based IT services.​


Self Assessment of Vendor solutions

Assessment of vendor solutions​ by vendors itself to determine the value for research of their products.

(One can even imagine this self-assessment will be part of the application process a vendor has to go through in order to have their product included in the service catalogue.​)

Service Catalogue

A catalogue for data management facilities for researchers. It aims to help researchers to make a reasoned choice when planning for the management and the storage of their data. Additionally, the information that is accumulated to fill the catalogue should help to identify potential gaps or other shortcomings within the facilities which have been described.​​

Service Provider (SP)

The owner of an IT service.​


A project that clearly demonstrates the functionality in a for the target group meaningful way.

See also: Showcase Approach, DRE Showcase

Showcase Approach

An approach where users are an integral part of the team working towards delivering the functionality of the showcase. It is not necessary that the problem is fully understood or defined at start, the focus is on maximizing the team’s ability to deliver quickly, to respond to emerging requirements and to adapt to evolving technologies and changes in community.

See also: DRE Showcase, Showcase 


Social ID authentication

Using a social media accounts such as Facebook or LinkedIn for authentication.​


SOLL architecture

From the German 'soll' versus 'ist': 'as should be' versus 'as is'. The architecture aimed for (versus the current architecture, IST architecture).


Solution Building Block (SBB) +

A candidate solution which conforms to the specification of an Architecture Building Block (ABB).​​​

Storage management

The term storage management encompasses the technologies and processes organizations use to maximize or improve the performance of their data storage resources. It is a broad category that includes virtualization, replication, mirroring, security, compression, traffic analysis, process automation, storage provisioning and related techniques.

Student Information System (SIS)

This is an information system to manage student/teacher data within educational/scientific institutes. Is also a main source of group information.​

Supervisory Authority

The public authority (or authorities) in a given jurisdiction responsible for monitoring the application of law and administrative measures adopted pursuant to data privacy, data protection and data security. 



National federation of identity providers (institutions) and a web-based IT service integrator.​


SURFconext Teams

A group management tool to create and manage groups. Services connected to SURFconext can use this group information, e.g. to decide who is allowed access to the IT service and to decide certain rights within a IT service.​


The systematic collection, monitoring and dissemination of health data to assist in planning, implementation and evaluation of an action or intervention such as research or public health.